Company Information

CIN
Status
Date of Incorporation
01 December 2011
State / ROC
Cuttack / ROC Cuttack
Last Balance Sheet
Last Annual Meeting
Paid Up Capital
500,000
Authorised Capital
1,000,000

Directors

Sunakar Nahak
Sunakar Nahak
Managing Director
about 14 years ago
Sachidananda Sahu
Sachidananda Sahu
Director
about 14 years ago
Manoj Kumar Das
Manoj Kumar Das
Director
about 14 years ago

Patents

Systems And Methods For Network Security

Methods, systems, and computer readable media for network security are described. In some implementations, security tasks and roles can be allocated between an endpoint device and a firewall device based on tag information sent from the endpoint and also based on resource availability and process reputation of a pro...

Detecting Iot Security Attacks Using Physical Communication Layer Characteristics

Methods, systems and computer readable media for protecting networks and devices from network security attack using physical communication layer characteristics are described.

System And Method For Providing A Secure Vlan Within A Wireless Network

Methods, systems and computer readable media for secure VLAN within a wireless network are described.

System And Method For Rogue Access Point Detection

Methods, systems and computer readable media for rogue access point detection are described.

System And Method For Location Based Endpoint Security

Methods, systems and computer readable media for location-based endpoint security are described.

Endpoint Controlled Rogue Ap Avoidance + Rogue Ap Detection Using Synchronized Security

Methods, systems and computer readable media for rogue access point detection are described.

A Method And System For Network Access Control Based On Traffic Monitoring And Vulnerability Detection Using Process Related Information

Disclosed are various embodiments of method and system for network access control. The method may involve traffic monitoring and vulnerability detection using process information. The system may analyze the vulnerability as a process malfunctioning where preventive action focuses on process blocking as opposed to ho...

System And Method For Rogue Device Detection

Methods, systems and computer readable media for rogue device detection are described. The method may include automatically generating one or more dummy network identifiers associated with a wireless network, advertising the one or more dummy network identifiers, and identifying a device as a suspect device based...

System And Method For Rogue Device Detection

Methods, systems, and computer readable media for rogue device detection are described. A method may include identifying a device type of a device transmitting data over a network and obtaining one or more uniform resource locators (URLs) from the data, where the one or more URLs form a portion of a request transmit...

Persistent Ip Address Allocation For Virtual Private Network (Vpn) Clients

Systems and methods for assigning a persistent internet protocol (IP) address to a virtual private network (VPN) client. The method includes receiving, at a first server, a request for access from a first VPN client, the request including access credentials and the first server having a routing table; sending, from...

Logging Configuration System And Method

Systems and methods for monitoring network activity. The methods include receiving at an interface a first logging parameter for a first network device, wherein the first logging parameter specifies how the first network device is to record data associated with the first network device; communicating the first log...

Network Access Using Hardware Based Security

An endpoint device uses hardware-based security to authenticate to an enterprise network. For example, an endpoint device such as network hardware or an end user device can request authentication in order to join an enterprise network that is managed by a computing platform such as a threat management facility. In o...

Signature Reporting System And Method

Systems and methods for monitoring network activity. The methods include causing a display of a user interface to a user, wherein the user interface configured to present to the user a classification of a signature, wherein the classification of the signature is made by a firewall, and receive an input from the use...

Security Of Network Traffic In A Containerized Computing Environment

A method comprises monitoring a computing environment including a plurality of containers, determining, for one of the containers, a service type and an IP address, assigning the IP address of the container having the determined service type to a first list of IP addresses, assigning an IP address of each of the con...

Admission Control In A Containerized Computing Environment

A method for performing admission control in a containerized computing environment includes deploying, by one or more processors of a computer system, the containerized computing environment, receiving, by the containerized computing environment, constraints associated with admission control for containers, the cons...

Threat Signature Scoring

Methods and systems for generating a plurality of threat signatures. In one embodiment, the method includes receiving at an interface a first plurality of threat signatures; adding, using one or more processors executing instructions stored on memory, at least one metadata attribute to each of the first plurality o...

Hybrid Web Application Firewall

Threat management devices and methods for a containerized firewall. The methods may include receiving instructions to configure a web application firewall being executed within a first container-based architecture, wherein the received instructions include changes to a previous network traffic policy; storing the re...

Containerized Network Activity Filtering

Systems and methods for operating a container-based architecture. The methods include executing, using one or more processors, instructions stored on memory to provide a Domain Name Service (DNS) proxy service, wherein the DNS proxy service is executed in a container-based architecture; and receiving at the DNS pro...

Signature Quality Evaluation

Systems and methods for scanning network activity. The methods include receiving at an interface connection data regarding a plurality of network connections, wherein the connection data includes a signature used to classify each of the plurality of network connections; determining, using one or more processors exe...

Applying Network Access Control Configurations With A Network Switch Based On Device Health

A method includes receiving, by a computer system, information related to device health of an electronic device, determining, by the computer system, a health status of the electronic device based at least in part on the received information related to the device health of the electronic device, requesting, by a swi...

Scored Threat Signature Analysis

Methods and systems for detecting threats using threat signatures loaded in a computing device. The methods include receiving a first plurality of threat signatures at a computing device, at least one threat signature of the first plurality of threat signatures having been assigned a score based on at least one met...

Systems And Methods For Network Security

Methods, systems, and computer readable media for network security are described. In some implementations, security tasks and roles can be allocated between an endpoint device and a firewall device based on tag information sent from the endpoint and also based on resource availability and process reputation of a ...

Domain Name Service Protection For Secure Web Gateway

A secure web gateway for a cloud computing environment comprises a data plane component, comprising: a front-end domain name service (DNS) configured to receive an inbound DNS request and map an IP address of the DNS request to a policy identification value corresponding to a customer policy and a plurality of plugi...

Cloud Threat Detection

A variety of techniques are used to improve monitoring of activities within a cloud computing environment that hosts resources for an enterprise network. For example, by enabling a remote threat management facility to identify relationships among nodes in the cloud, identities in the cloud, and sequencies of activit...

Registered Trademarks

Sophos Safeguard Sophos

[Class : 9] Hardware And Software, Especially In The Area Of It Security And It Security Technology; Hardware And Software For Ensuring The Authenticity, Integrity And Confidentiality Of Data In Single User And Multi User Environments, And For The Secure Generation, Storage And Management Of Cryptographic Keys; Software For The Encryption Of Memory Media And Devices, Es...

Sophos Sophos

[Class : 9] Computer Software Programs; Data Storage Media For The Storing Of Computer Programs Or Bearing Recorded Computer Programs; Material In Electronic Form Supplied On Line From Databases Or From Facilities Provided On The Internet, Including Websites.[Class : 16] Printed Matter; Printed Publications; Instruction Manuals; All Relating To Computer Security, Computer So...

Puremessage Sophos

[Class : 9] Computer Software, Computer Programs; Data Storage Media For The Storing Of Computer Programs Or Bearing Recorded Computer Programs; Material In Electronic Form Supplies On Line From Databases Or From Facilities Provided On The Internet, Including Web Sites; Computer Software For Managing And Protecting Electronic Messaging Systems By Means Of Electronic Mail Fil...

Documents

Form 23B for period 011211 to 310313-211211.OCT
Form 18-220612.OCT
Optional Attachment 1-140612.PDF
Acknowledgement of Stamp Duty MoA payment-011211.PDF
Acknowledgement of Stamp Duty AoA payment-011211.PDF
Certificate of Incorporation-011211.PDF
Certificate of Incorporation-011211.PDF
Optional Attachment 1-291111.PDF
MoA - Memorandum of Association-291111.PDF
AoA - Articles of Association-291111.PDF
Form 1-291111.PDF
Form 32-261111-261111.PDF
Form 18-261111-261111.PDF